Digital Sovereignty

36
... as the Basis of a Society’s Digital Self-Determination Digital Sovereignty The Customer Magazine Issue 1/2016 Svenja Schulze Interview: Minister for Innovation, Science and Research in North-Rhine Westphalia Wolf-Rüdiger Moritz Interview: Chief Security Officer at Infineon and Member of secunet’s Supervisory Board NATO NAPMA uses SINA for secure remote access

Transcript of Digital Sovereignty

Page 1: Digital Sovereignty

... as the Basis of aSociety’s Digital Self-Determination

Digital Sovereignty

The Customer Magazine Issue 1/2016

Svenja Schulze

Interview: Minister for

Innovation, Science and

Research in North-Rhine

Westphalia

Wolf-Rüdiger Moritz

Interview: Chief Security

Officer at Infineon and

Member of secunet’s

Supervisory Board

NATO

NAPMA uses SINA for

secure remote access

Page 2: Digital Sovereignty

Content

2 secuview 1/2016

28

The Transparent Man – Myth or Reality?

Revealing one’s location in social networks means

opening up to the risk of being very easily monitored.

Control the Network – Tailored

Real-Time Network Analysis

32Science04 Massive Innovation Through Excellent

Research Infrastructure

National08 Digital Sovereignty as a Basis for

a Society’s Digital Self-Determination

11 Three Questions for secunet’s CTO

Dr Kai Martius

International13 Montenegro – Securely Connected

to the World

14 NAPMA Uses SINA for

Secure Remote Access

18 More Security at Passport Control

19 Trust is Good, Checks are Better

Technologies & Solutions21 Protecting Network Infrastructures:

Security Through Intelligent Separation

25 Certified Trustworthiness: the secunet

eID PKI Suite and secunet wall

26 SINA Rejuvenated

26 Sneaker Administration is History!

27 News from the SINA Workstation S

27 The First Ethernet Encoder with

SECRET-Level Approval

28 Control the Network – Tailored

Real-Time Network Analysis

30 Long-term Key Management

32 The Transparent Man – Myth or Reality?

34 German IT Security Congress:

Call for Papers

News in Brief07 Microsoft and secunet Provide Cloud

Solution for German High-Security Market

07 20 Million Income Tax Declarations

Last Year

20 EasyPASS is Growing

35 New Address

Dates35 Upcoming Events

Page 3: Digital Sovereignty

secuview 1/2016 3

Editorial

here are many aspects to the much discussed

issue of digital sovereignty. One of them we

know from our private lives: anyone who wants

to avoid becoming a ‘Transparent Man’ on social

networks, mobile apps and more needs to exercise

caution and be digitally literate. However, in this issue

of secuview, we focus on another aspect at a much

higher level: that of the economy, state and society.

What enables a society to act and make decisions

independently on data and IT systems? One oft-cited

factor is control over key information technologies –

but as Wolf-Rüdiger Moritz explains in his interview,

this is hardly achieved in Germany and throughout

Europe. Indeed, the local IT industry is niche-based

and basic IT infrastructure components increasingly

have to be imported from non-European markets.

This makes it all the more important to bolster our

existing niches, both nationally and at the European

level. The transformation of the fragmented European

IT industry into a digital single market – as envisaged

by EU Commissioner Günther Oettinger – has the aim

of achieving greater digital sovereignty. secunet is also

increasingly making its voice heard at the European

level, for instance at the newly founded European

Cyber Security Organisation (ECSO) or at the ENISA

permanent stakeholders’ group.

Is our society vulnerable to attack due to our frag-

mented local IT industry? The good news is that digital

sovereignty has more to do with autonomy than autarky.

That means that we don’t necessarily have to return all

aspects of the IT industry to Germany or Europe. The

most important step towards digital sovereignty is the

consistent use of trusted IT security solutions.

The conditions for this are good; Germany for example

has traditionally been highly sensitive to data pro-

tection and security – and not just since the revelations

in connection with Edward Snowden. Another advan-

tage is Germany’s open encryption policies, which

don’t curtail the use of encryption technologies in this

country. Also, thanks to the German IT Security Act, it

is hoped that even greater protection for critical infra-

structures can be achieved. Add to that the aforemen-

tioned European initiatives. It is now up to us to take

up the thread and achieve greater digital sovereignty

for our societies.

Happy reading and have a wonderful summer!

Dr Rainer Baumgart

T

Page 4: Digital Sovereignty

4 secuview 1/2016

Science

We at secunet benefit a great deal from NRW’s

strong scientific landscape; we’ve already recruited

several highly capable employees from the region’s

universities – and just a few months ago, we founded

finally safe GmbH with the Westphalian University of

Applied Sciences in Gelsenkirchen. In your work,

you aim to strengthen the position of universities in

NRW. How are you going about this? What initiatives

are you currently involved in and what ideas do you

have for the future?

Schulze: The regional government has a clear focus

on education and research. In 2016, our budget was

increased by €430 million to €8.2 billion. That’s a new

record and leaves us with 41% more funds than we

had in 2010. The region worked very hard to achieve

this and the boost in funds will be used to continue

improving teaching and learning conditions.

Excellent research infrastructure is crucial to the in-

novative spirit of NRW as a business hub and forms

the foundation of pioneering research and develop-

ment. It is also one reason that experts from all over

the world travel to NRW to conduct their research.

To ensure that this continues, the state has (among

other things) joined forces with the EU to create

a new funding programme to enhance university

Massive InnovationThrough ExcellentResearch Infrastructure

In interview:

Svenja Schulze was appointed as the North-Rhine

Westphalian regional government’s Minister for

Innovation, Science and Research by Hannelore

Kraft in July 2010. With the abolition of tuition fees

in North-Rhine Westphalia, Schulze orchestrated

one of the regional government’s largest political

projects. On 21 June 2012, Schulze was reappoint-

ed to the same ministerial post for a second term in

Cabinet Kraft II.

An interview with Svenja Schulze, Minister for Innovation, Science and Research in North-Rhine Westphalia

Page 5: Digital Sovereignty

Science

secuview 1/2016 5

research infrastructure, with up to €200 million

earmarked for modernising and expanding applied

research in NRW.

We work closely with the Westphalian University of

Applied Sciences and the Ruhr University Bochum’s

Horst Görtz Institute on joint projects to create syn-

ergies between science and business. What advan-

tages are there to this type of cooperation? And what

do you do to promote closer cooperation?

Schulze: Virtually all areas of our daily lives are now

experiencing a digital transformation. These changes

offer new potential, but are also associated with

significant security challenges. Secure IT systems

and processes are key factors in successfully shap-

ing the digital revolution.

In April, we founded the Wirtschaft und Arbeit 4.0

alliance in NRW. The regional government, business-

es, trade unions and scientific community want to

develop NRW as a top location for all things digital.

In a joint declaration, the participants set out the key

areas we want to work on in the coming years. One

thing we want to do is advance digitalisation and as-

sist business and society in the transition.

Important areas here include technology transfer

for SMEs, IT security, developing broadband infra-

structure, promoting key skills in further and higher

education and continually monitoring our funding in-

struments for currency and efficiency.

The region also founded the HochschulStart-up.

NRW initiative, which aims to accelerate knowledge

and technology transfer between science and busi-

ness. Together with the European Regional Develop-

ment Fund, the ministries of science and economic

affairs have earmarked almost €70 million for this

until 2020.

University spin-offs are vitally important for the

region, as they ensure innovations are put into

practice as quickly and efficiently as possible. They

also create jobs and apprenticeships and enhance

the region’s global competitiveness. Through the

START-UP-Hochschul-Ausgründungen programme,

the Ministry of Science will invest €21 million into a

university spin-off funding competition until 2020.

Another of your objectives is to increase NRW’s

technological capabilities. How important are the

cross-cutting issues of IT and IT security?

Schulze: IT security is crucial for NRW – particularly

when it comes to SMEs, manufacturing and Industry

4.0. The opportunities and risks of digitalisation are

key factors in the future development of our region

and its economy. For this reason, we also need ideas

from scientists, many of whom are already grappling

with the challenges of the digital revolution through-

out NRW.

In NRW, 800 researchers are currently working in

the field of IT security. To ensure that NRW retains

its global edge in IT security research, the ministries

“Secure IT systems and processes are key factors in successfully shaping the digital revolution.”

>>>

Page 6: Digital Sovereignty

6 secuview 1/2016

Science

of science and economic affairs have committed

€400,000 of public funds to developing the Horst

Görtz Institute for IT Security at the Ruhr Universi-

ty Bochum. In addition, exchanges between experts

on the nrw.unITS network will receive funding to the

tune of €600,000.

Structural change has long been an important issue

in NRW – and in the advent of digitalisation, industri-

al change has now gone in an entirely new direction.

What role do you think IT security has to play here?

Schulze: NRW is already a leading national hub for

IT security. I believe we should exploit this position

and develop it further. The regional government is

currently working closely with universities and re-

search institutes to develop a long-term strategy

for boosting IT security. In April, an expert panel of

scientific and commercial representatives drafted a

strategy paper on IT security. We are now seeking to

expand on these initial objectives in order to devise

an appropriate research agenda.

The authors of the paper summarised their ten most

important recommendations for a successful digital

economy as follows:

1. Implement lighthouse IT security projects

2. Conduct media campaigns to raise user

awareness of IT security

3. Boost digital skills (including IT security) in

schools and universities

4. Increase the number of IT security

professorships

5. Develop a further education platform

for IT security

6. Found an IT security start-up centre together

with Digitale Wirtschaft NRW

7. Expand support for research on secure and

reliable IT systems as prospective measures

(‘security by design’ principle)

8. Implement European minimum standards for

procurement by authorities and public

institutions

9. Increase user acceptance of IT security

10. Develop the ‘Mehr Verschlüsselung für alle!’

(More Encryption for All!) security initiative n

Page 7: Digital Sovereignty

News in Brief

secuview 1/2016 7

20 Million Income TaxDeclarations Last Year

secunet supports a part of the ELSTER infrastruc-

ture: On behalf of the Regional Tax Authority of

Bavaria, secunet implemented a secure platform for

authentication and encryption through certificate-

based processes. n

*Source: Behörden Spiegel, Newsletter E-Government No. 772, April 20th, 2016

n Germany, the ELSTER electronic tax decla-

ration has become a firmly established virtual

administrative channel. In 2015, 20 million decla-

rations of income tax were submitted electronically*

– more than ever before! The main idea behind

ELSTER is to efficiently and securely transfer tax

information electronically between citizens, employ-

ers, tax consultants, income tax assistants, tax

officials, municipalities and associations.

I

The jointly-provided solution is to offer both on-prem-

ises products, which the user operates itself at a

transition point in its infrastructure, and virtualised

solutions that are fully integrated into the public

cloud. n

More information:

Dr Kai Martius

CTO secunet

Armin Wappenschmidt

[email protected]

n future, secunet will also offer data-sensitive or-

ganisations, particularly from the public sector,

the tried and tested, certified SINA encryption

technology via the cloud platform Azure from Micro-

soft Cloud Germany: Customer data is stored in

German data centres, and access to the data is un-

der the control of a German data trustee. The SINA

core functions such as network and data encryption

supplement the security mechanisms that exist in

Microsoft Azure for authentication, HSM usage and

safeguarding virtual machines in a way that enables

sovereignty over the keys to be retained.

I

Microsoft and secunetProvide Cloud Solution forGerman High-Security Market

Page 8: Digital Sovereignty

National

8 secuview 1/2016

You chair the ZVEI Digital Sovereignty working group,

which is examining Germany’s sovereignty and the

new challenges it faces in the digital era. What does

digital sovereignty mean in Germany?

Moritz: In the strategic working group we drew up

the following definition:

Digital sovereignty describes the ability to continually

control the reliability, integrity and availability of data

transfer, storage and processing.

If you think about it, you’ll quickly see that this is a

tall order that can only be achieved through con-

certed effort. We are far from reaching this milestone

in Germany; the aforementioned conditions have

not been met for essential, security-related network

components and encryption systems used by large

corporations. Due to the state of the market and

established standards, there is no de facto freedom

of choice in products from Germany and Europe that

can guarantee the security and integrity of our data.

This applies in a wide range of areas and, particularly,

to operating systems, CPUs and network infrastruc-

ture. German companies live off of their knowledge

and expertise – and protecting this is a strategic

objective. But knowledge isn’t everything. The

digital revolution has also changed the manufacturing

landscape and even penetrated the private sphere.

The increased networking of people, machines

and products offers both risks and opportunities.

Digital Sovereignty asa Basis for a Society’s Digital Self-DeterminationAn Interview with Supervisory Board MemberWolf-Rüdiger Moritz

In interview:

Wolf-Rüdiger Moritz is the

Chief Security Officer at chip

manufacturer Infineon, based

in Neubiberg near Munich.

He has been a member of

secunet’s Supervisory Board

since 2014. Like secunet,

Infineon is a security partner

of the Federal Republic of

Germany

Page 9: Digital Sovereignty

secuview 1/2016 9

National

However, these opportunities will only outweigh the

risks if we succeed in creating this connection in a

secure environment that offers no attack vectors

for industrial espionage and criminal organisations.

Skills gaps in security-related fields of information

technology can have a significant, long-term impact

on a country’s competitiveness and national security.

Politicians have now come to recognise this. The

coalition agreement therefore details measures for

reclaiming Germany’s and Europe’s digital sove-

reignty – an urgently important task.

What would the consequences be if digital sove-

reignty were neglected or ignored? What (long-term)

impact would this have for our society?

Moritz: Digital sovereignty is the basis of our socie-

ty’s digital self-determination. If we don’t achieve it,

the reverse will apply: digital dependence, whereby

key ICT products are developed outside of our own

sphere of influence. Over the long-term, this means

losing our connection to constantly increasing tech-

nological developments in this area. Politically speak-

ing, this would pose significant risks to national

security. Consequently, we’re talking about a strate-

gic topic that’s of considerable importance for our

future.

As I said earlier, increased integration is the basis of

ever faster processes and, in turn, higher productivi-

ty. In the market, the winners are those who can con-

trol these processes and implement them best. But

what happens if this control is merely tolerated and

an external entity has actual control of the system?

Companies’ strategic knowledge can be siphoned

off unnoticed and critical control processes can be

manipulated. This could lead to financial losses, sab-

otage and blackmail; from ransomware as we know

it to major, damaging events, anything and every-

thing is possible. In a scenario like this, it seems

to me that a nation’s digital sustainability would be

seriously at risk.

Many companies are digitalising – or have already

digitalised – their processes to stay one step ahead

of the competition. What role does digital sovereign-

ty currently play here? And what role should it play?

Moritz: This process is not really new; it’s simply

taking place on a much larger scale. Take Industry

4.0 and the Internet of Things: neither would work

without security. The more processes are digital-

ised, the greater the risk of them being compromised

and the greater the potential for damage as a result.

Without using trusted security components around

vulnerabilities, this development could be a ticking

time-bomb.

Let’s talk about Made in Germany. German IT

security products offer a high degree of security

and robustness in conjunction with Germany’s open

encryption policies. How important are these prod-

ucts on the global market today?

Moritz: Germany has developed considerable

technical expertise in security technology and

secunet AG is one of the leading providers in

Germany; SINA Boxes are used in national securi-

ty networks for good reason. Unfortunately, despite

internationally renowned quality, German providers

have so far failed to adequately position themselves

in the market. We need to work on this.

What steps do we need to take to improve the global

success of the German IT security industry? >>>

“Skills gaps in security- related fields of information technology can have a significant, long-term impact on a country’s competitiveness and national security.”

Page 10: Digital Sovereignty

10 secuview 1/2016

Moritz: I believe that we’ve not yet sufficiently

realised the importance of information security in

Germany. In my view, the IT Security Act is a step in

the right direction to raise general awareness.

However, I’d go a step further. The question is: is

defence against cyber attacks like APTs on multiple

German companies still an isolated problem for the

affected companies, or is it rather a national duty

to protect the economy? During cyber attacks, it is

often very difficult – or even impossible – to identify

the attacker. Cyber attacks can be motivated by any

number of factors. Script kids, hacktivists, criminals,

intelligence services and the military are all possible

attackers. It is therefore difficult to draw the line be-

tween attacks in the civilian environment and infor-

mation warfare. This poses even more questions in

the context of international law. If Germany is able

to find the answer to this problem and adopts a

pioneering role in security design and technology,

this could also help the entire German IT security

industry.

What we need is a comprehensive, holistic national

cyber strategy that interlinks politics, academia and

industry, and launches and promotes targeted proj-

ects that will advance Germany on the road to dig-

ital sovereignty. A strong domestic market – which

uses products from trusted environments as a start-

ing point, flanked by politically endorsed European

initiatives – could be the perfect springboard into

the global market for German security products. n

Page 11: Digital Sovereignty

secuview 1/2016 11

National

Digitalisation means faster processes, more net-

working and higher data volumes – as well as a

greater risk of attack. Storing our information on

internal servers is becoming a challenge – and

despite all our doubts and questions, cloud-based

solutions are looking more appealing every day. How

secure are cloud solutions? Is it acceptable to store

classified information in the cloud?

Dr Martius: When applied to cloud computing as a

generally available, inexpensive infrastructure, the

economies of scale are essential and indisputa-

ble. Today, no-one would surely think to set up their

own telephone lines to liaise with their partners. In

this respect, we may be on the verge of a new para-

digm, as it was the case in the telecoms industry 100

years ago. However, cloud computing differs in one

big way from just transferring data across telephone

lines: the data is processed and edited by the pro-

vider. As a result, I can’t simply encrypt my data

before transferring it to the provider (unless I’m

using a solution that uses the cloud as mere storage

space; we are working on a product like this which

will be called SINA Cloud Connector). We’re there-

fore looking for ways to use the cornerstones of

SINA technology – separation and encryption – in

the cloud to prevent unauthorised access and mini-

mise the effects of errors. All in all, it’s about only mak-

ing data accessible at the time it is processed, and

allowing this processing to take place in a secure

‘shell’. In addition, communication from the out-

side must be encrypted up to (or near) its end point.

Crucially, the encryption and separation components

must have a high degree of reliability and integrity.

It’s also important that key management takes place

under our own sovereignty. This suggests the use of

the SINA technology components.

Despite this, you have to have a certain amount of

trust in the provider, as at some point the data and

temporary encryption key will be exposed on the >>>

Three Questions forsecunet’s CTO Dr Kai Martius

In interview:

Dr Kai Martius has been secunet’s CTO since

2015. From 2007 to 2015, he managed secunet’s

High-Security / Public Sector division. Before that,

he had held various positions in Consulting and

Product Development since 1999. Dr Martius

significantly contributed to the development of

SINA.

Page 12: Digital Sovereignty

12 secuview 1/2016

National

operator’s computers. Using technology, you can

still only increase the effort and outlay required to

successfully access data, so I’m sure there’s a

certain amount of highly sensitive data that I

wouldn’t want to process in the cloud.

It’s also necessary to make the integrated SINA func-

tions and the cloud’s existing mechanisms compat-

ible. That’s why close cooperation with cloud provid-

ers is vital to achieving the highest possible level of

security while retaining the key features of the cloud.

Close cooperation already exists between Microsoft

and secunet, for instance, the aim being to combine

trusted, high-tech SINA components with the high

provider reliability that Microsoft likes to establish by

operating two German Azure data centres according

to the data trustee concept.

In his interview, Wolf-Rüdiger Moritz described digi-

tal sovereignty as the ability to continually control the

reliability, integrity and availability of data transfer,

storage and processing. How does secunet support

public authorities and companies in acquiring and

retaining this ability in the face of digitalisation?

Dr Martius: The cornerstones of digital sovereignty,

and therefore of secure IT in general, are trusted en-

cryption and separation characteristics (or data flow

control). Reliability must be earned by technology

(and its manufacturers) – it’s a question of technical

competence, transparency and processes. secunet

has worked towards this for over 15 years with the

German Federal Office for Information Security (BSI),

the German body responsible for evaluating IT secur-

ity. The result is the highly successful SINA product

range, which we continue to develop today. For us,

it’s important to continually adapt the technology to

new requirements in order to remove any security

stumbling blocks for our customers and deliver ‘the

trusted components of a secure IT infrastructure’.

Examples of our innovative developments include

the aforementioned integration with cloud technolo-

gy in cooperation with Microsoft, close cooperation

with the company Citrix for the seamless integra-

tion of SINA into their infrastructures, and efforts to

boost the performance of our network products in

such a way that we can keep pace with the network’s

growth rates.

What do you make of current developments in the

European IT security industry?

Dr Martius: On one hand, the industry is subject to

consolidation processes, which – at least in terms

of digital sovereignty – could be very problematic.

What influence will foreign owners ultimately have on

‘national’ companies? On the other hand, it’s clear

that national markets alone cannot guarantee a com-

pany’s future viability. European cooperation in de-

veloping technologies is certainly welcome, but this

sensitive topic must be handled under the watchful

eye of the government. After all, digital sovereignty

is (still?) a national issue, not a European one. We

favour technology partnerships that allow us to meet

our high standards for products’ constructive secur-

ity, while also retaining the transparency required by

the BSI, for instance – as with the aforementioned

partnerships with Microsoft and Citrix.

This dovetails with another topic, which doesn’t just

affect the European security industry: the availability

of skilled employees. At this year’s RSA Conference,

it was estimated that the USA alone will have a short-

fall of around two million IT security experts by 2020.

Apparently, the education sector is lagging behind

the demands of a rapidly growing industry. Conse-

quently, secunet is deeply committed to cooperating

with secondary schools to promote IT security and

pique the younger generation’s interest in the sub-

ject. As our society steadily becomes more depen-

dent on technology and IT security, there will be a

global imperative to give the subject more weight at

each stage of education. n

“Reliability must be earned by technology.”

Page 13: Digital Sovereignty

secuview 1/2016 13

International

fter its secession from Serbia in 2006,

Montenegro needed to establish a foreign

ministry and its own network of embassies

connected to the ministry for communication pur-

poses. As a candidate country for the European

Union, it made sense to implement the project in

conformance with EU standards from the beginning.

In March 2015, the Montenegrin foreign ministry

awarded secunet (as a qualified partner) a Europe-

wide public tender for the “supply of equipment

for strengthening the capacities of the diplomatic

consular network of the Ministry of Foreign Affairs

and European Integration”. In particular, secunet’s

cooperation with the German Federal Foreign Office

and its experience working on the joint SINA project

gave it an excellent footing for the project. secunet

started the project for the encrypted connection of

28 embassies and consulates to the ministry in the

Montenegrin capital of Podgorica last year.

Alongside over 30 SINA Boxes and a few SINA

Workstations, secunet realised the project – which

was financed wholly through the EU Infrastructure

Fund (EU Delegation to Montenegro) – with SINA

Management, SINA Training and SINA Installation

Support.

By July and September 2015, secunet had already

implemented pilot installations with encrypted

connections to the embassies in Berlin, Belgrade

and Vienna. Additional SINA Boxes were then set

up by the end clients; approximately half of the

embassies are securely connected through SINA.

The connections to the foreign ministry are secured

up to EU RESTRICTED level – meaning emails, data

server access and VoIP telephone connections are

reliably protected. The key applications that run

via the new SINA-secured communication network

handle matters regarding visa and passport ad-

ministration.

In the meantime, four additional embassies have

been opened: little Montenegro – an EU and NATO

candidate country and a member of the UN, WTO,

OSCE and the Council of Europe – is growing! n

More information:

Christian Linke

[email protected]

Montenegro – Securely Connected to the Worldsecunet is currently enabling 28 embassies and consulates to encrypt connections to the Ministry of Foreign Affairs and European Integration in Podgorica. From now on, over 30 SINA Boxes will secure the Balkan state of Montenegro’s communications with its outposts

A

Page 14: Digital Sovereignty

14 secuview 1/2016

n December 1978, a number of NATO Na-

tions joined together to establish the NAEW&C

Programme. NAPMO was created as a NATO

Production and Logistics Organisation to imple-

ment the Programme. It is directly responsible to

the North Atlantic Council for all aspects of the

NAEW&C Programme.

The NAPMA is the executive agency of NAPMO. Its

approximately 115 posts are filled by seconded mil-

itary officers and civilian personnel drawn from the

Nations participating in the NAEW&C Programme.

Within the responsibilities granted to NAPMA, the

agency manages all aspects of the Programme from

acquisition through delivery and on through Life

Cycle Management of the NE-3A.

NE-3AThe NE-3A aircraft is a militarised version of the

Boeing 707 commercial airliner airframe. It is dis-

tinguished by the addition of a large, rotating roto-

dome containing its radar antenna. Its mission system

includes surveillance radar, navigation, communi-

cations, data processing, identification, and display

NAPMA Uses SINA forSecure Remote AccessNAPMA is the NATO Airborne Early Warning & Control(NAEW&C) Programme Management Agency

I

Page 15: Digital Sovereignty

secuview 1/2016 15

International

equipment. The NE-3A fills the needs of both air-

borne surveillance and Command and Control (C2)

functions for tactical and air defence forces. It pro-

vides a highly mobile, survivable surveillance and

C2 platform. The NE-3A offers superior surveillance

capabilities. Equipped with a “look-down” radar,

the NE-3A can separate airborne targets from the

ground and sea clutter returns that confuse other

present-day radars. Its radar “eye” has a 360-degree

view of the horizon and, at operating altitudes, can

“see” more than 400 kilometres (215 nautical miles).

It also can detect and track both air and sea targets

simultaneously.

Current and potential upcomingmodernisation projectsCurrently NAPMA executes the Follow-Up (FUP)

Modernisation projects that are primarily aiming at

enhancing the Identification system (Mode5 / En-

hanced Mode S) and replacing the analogue cockpit

technology with a digital environment (Cockpit

Modernisation – CNS/ATM). Studies are also being

pursued to integrate Internet Protocol (IP) commu-

nications.

Besides the current modernisation projects, studies

and analysis on a potential Final Lifetime Extension

Programme (FLEP) are ongoing to determine feasible

technical solutions to meet unfulfilled operational

requirements, maintain the platform’s relevance and

extend the NE-3A fleet’s lifetime to support NATO

operations to 2035.

Use of SINA at NAPMANAPMA operates a small secure dedicated client-

server environment centered on Microsoft tech-

nology to provide office automation and external

connectivity (NAPMA NR domain). The main services

provided to the users are email (MS Exchange),

document management (MS SharePoint) and an >>>

The NAPMA is responsible for planning and coordinating acquisition strategies and for managing contracts

associated with modernisation of the NE-3A fleet. The NAPMA General Manager is responsible for the day-to-day

management of the Programme. He is aided in this task by a Deputy General Manager, a Legal advisor, and an

Internal Auditor. The Agency is then organised around the following Divisions or Offices:

- The Programme Management Division is responsible for implementing projects throughout the development,

production and retrofit phases in response to operational military requirements and for Programme-wide

planning and development. It performs concept definition and project validation studies, provides primary liaison

with external organisations, and performs system test activities and quality assurance.

- The Programme Support Division is responsible for contracting, industrial benefits and industrial participation,

logistics and configuration management duties, and Information Management.

- The Financial Controller’s Office is responsible for the treasury, budgeting, accounting and cost analysis

functions necessary for the effective execution of the Programme.

- The Human Resources and General Services Office is responsible for all personnel matters, security, and

general administrative support services, including travel and registry functions.

- The Chief Engineer’s Office is responsible for advising the General Manager, as the Technical Airworthiness

Authority, on engineering matters and ensuring that Operational, Safety, Suitability, and Effectiveness (OSS&E)

requirements are adequately addressed.

Page 16: Digital Sovereignty

16 secuview 1/2016

International

enterprise resource planning system (SAP/R3). The

users are equipped with desktop as well as laptop

workstations.

Approximately 20 NAPMA employees are assigned

with mobile devices and are regularly working off-

site via secure remote access during business

trips (mostly, but not excluding: Europe and North

America) and outside the regular business hours.

About five employees with assigned mobile devices

are constantly working off-site via secure remote

access (e.g. in Germany, Belgium, and the United

States of America). Five devices are needed in a

pool, in order to provide secure remote access to

alternating employees for business trips or other

off-site work. They all require the same functionality

as the in-house workstations.

To cope with this requirement, NAPMA initiated an

international competitive bid. The operational objec-

tive was to establish, maintain and operate a NOS

accredited Secure Remote Access (SRA) capabili-

ty as an integral part of NAPMA infrastructure that

enables staff to work on- and off-site, on- and

off-line with the same functionality as the in-house

NAPMA NR workstations and a similar performance.

NAPMA’s Secure Remote Access Capability is

maintained and operated by CONET Services

GmbH. Currently, NAPMA has 30 SINA Workstation

S ThinkPad T540p in use. The backend consists of

a SINA Management Workstation and two SINA L3

Box S 30M. The workstations provide two separate

Sessions/Workspaces to the users:

- For NAPMA business use up to and including

NATO RESTRICTED, there is the NAPMA NR

Workspace based on the same image like on any

other NAPMA Workstation. It is flanked with

centralised configuration management through

MS SCCM and restricted internet access.

- In addition there is a “Dirty Internet” Work-

space based on a simple Linux setup (Linux

Porteus 3.1) allowing web-browsing and basic

Open Office applications without content filter-

ing on the internet access (e.g. check-in for flights

during TDY). This license free system requires low

maintenance and is running from memory (frugal)

with read-only on the disk, to ensure the next

launch will reload an unmodified configuration

into the memory.

Overall the NAPMA users are very pleased with the

SINA system and its performance. From an admin-

istrator perspective, the SINA system works fine

for NAPMA. The system requires less support than

initially expected and the IT operators are satisfied

with the required management, configuration as

well as the integration into the existing NAPMA NR

domain. n

More information:

Stephan Sauer

[email protected]

Holger Kalnischkies

[email protected]

Page 17: Digital Sovereignty

EMSCHERGENOSSENSCHAFT / LIPPEVERBAND Kronprinzenstraße 24

45128 Essenwww.eglv.de

Page 18: Digital Sovereignty

International

18 secuview 1/2016

t airport border control, travel documents

are checked electronically and using opti-

cal methods. In Germany, both tasks can be

carried out by a machine, provided that the machine

follows the TR-03135 technical guideline set out by

the German Federal Office for Information Security

(BSI). As there is an additional need for practical

guidelines for optical document verification, the Ger-

man Federal Criminal Police Office (BKA) recently

commissioned secunet to create them.

Since 2013, secunet has been working with the BKA

to evaluate the performance of optical document

verification systems under Project AROMA (Ad-

vanced Research on Optical Machine Authentication).

Based on the results of this analysis, secunet is

now working with the BKA to devise best practice

guidelines for automated optical passport control.

The guidelines will address document designers,

document verification system manufacturers and

machine operators.

The new guidelines will help to improve verification

quality and enhance border security – and they will

ultimately play an international role; the Technical

Advisory Group of the International Civil Aviation

Organization (ICAO) has already given the green

light for further development of the guidelines into

an official ICAO technical report. What’s more, the

insights from Project AROMA have already been fed

into the TR-03135 guideline.

However, this is just one milestone in the project;

secunet is currently working with the BKA to de-

velop the second part of the guidelines, which will

contain recommendations for evaluating optical

document verification systems – from test planning

to evaluation. This part of the document will also

include the results of a detailed practical test con-

ducted at border control gates at Frankfurt airport.

The BKA and the German Federal Police thus have

a strong partner onside as they continue to analyse

and optimise the quality of optical document verifi-

cation systems. n

More information:

Dr Jörn-Marc Schmidt

[email protected]

More Security atPassport ControlTogether with the German Federal Criminal Police Office, secunet is developing the first guidelines for automated optical passport verification

A

Page 19: Digital Sovereignty

secuview 1/2016 19

International

n the future, the EU Member States (and Schen-

gen states) want to more reliably check that only

the holders of genuine travel documents are able

to criss-cross Europe’s borders. To this end, the

European Commission has launched a pilot proj-

ect aiming to create a uniform basis for checking

electronic documents at the border.

In order to verify the integrity and authenticity of

an electronic identity document, the verifying state

needs access to special (public) certificates from

the issuing state. EU Member States have always

had different ways of handling the exchange of

certificates. The establishment of a so-called

Schengen master list would facilitate this task. It

would contain all available trusted certificates. All EU

Member States will then be in a position to securely

verify international travel documents electronically.

This will help the authorities to identify forgeries and

manipulations more reliably, while also paving the

way for all Member States to issue modern identity

documents (eIDs).

The Schengen master list will contain trusted cer-

tificates which a minimum number of Member

States have verified as being authentic. This initial

certificate authentication is primarily performed at

border-control using high volumes of genuine travel

documents.

Besides its extensive expertise in creating the

policies needed for the new system, secunet will

be delivering software (N-PKD) for managing the

certificates and generating the central Schengen

master list. n

More information:

Matthias Niesing

[email protected]

Trust is Good,Checks are BetterIn the EU, the European Commission starts a pilot projectto trial a Schengen master list for checking electronic travel documents

I

Mr Rossi, an Italian citizen, is returning home from a business trip in the USA. He first lands at the Charles de Gaulle

airport in Paris before continuing on to Fiumicino Airport in Rome. When checking Mr Rossi’s documents, the French

border police verify the integrity – or accuracy – of Mr Rossi’s data and the authenticity of his electronic identity

document. To do this, they check the so-called document signer (DS) certificate stored in the document against the CS

certificate issued by the Italian Republic. Through this certificate, the French border police have access to the central

Schengen master list, which contains certificates from the 28 EU Member States, as well as those from other, non-

European countries. If the DS certificate and other security features are verified successfully, the French border police

can be sure that nothing is amiss with Mr Rossi’s passport. Mr Rossi is therefore permitted to cross the EU border and is

later greeted in Rome by his overjoyed dog Gaston.

Mr Rossi travels home

Page 20: Digital Sovereignty

News in Brief

20 secuview 1/2016

EasyPASSis Growing

There are currently 140 EasyPASS border control

gates in operation at the Frankfurt, Düsseldorf,

Munich, Berlin-Tegel, Hamburg and Cologne/Bonn

airports. With this year’s expansion, the German

Federal Police will easily be able to handle growing

passenger numbers at airports throughout Ger-

many; in 2015, footfall increased by 3.9% on the

previous year (source: ADV). n

More information:

Thomas P. Schäfer

[email protected]

he German Federal Police has announced

plans to considerably expand its use of the

EasyPASS system in German airports. By

the end of the year, a further 35 automated border

control gates will be installed. The existing consort-

ium between secunet and Bundesdruckerei GmbH

will deliver the systems.

For two years now, travellers have been able to

voluntarily use the EasyPASS system at Germany’s

busiest airports – and more people use the system

every day. During the system’s first year, around 4.3

million travellers opted to use the automated bor-

der control gates, with this number increasing to 6

million passengers in 2015.

T

Page 21: Digital Sovereignty

systems are barely existent, let alone controllable.

Does digitalisation mean boosting efficiency at the

cost of security? Legislators only recently set out

requirements for an appropriate level of security with

the IT Security Act.

Easier said than done?To proactively tackle new threats and prevent the

exploitation of system vulnerabilities, security must

be approached from the following angles:

- Who is allowed to access the network and who

can access what security domain?

- Who can access what system?

- How are access rights managed for internal and

external employees, service providers and auto-

mated data communication between machines?

- How can this be implemented across different

security domains – especially with different security

classifications – without jeopardising business-

critical processes?

rior to digitalisation, critical networks were

strictly separated – thus providing optimal

network security. Public authorities used

paper-based processes and paper documents were

then securely stored and forwarded as necessary.

Critical infrastructures used to be on their own

network with their own protocols, with no connection

to the outside world, and the first industry robots had

no UMTS connection to the internet. Instead, they

were directly wired into a control console.

However, this is now a thing of the past. Thanks to

digitalisation, all systems are integrated – and are

often based on common technologies like the inter-

net protocol. This creates fast digital connectivity,

efficiency and potential cost savings. Networks are

also often based on so-called management systems

like the ERP system. Nowadays, all systems are in

some way connected and in many cases, differ-

ent security classifications between networks and

Protecting NetworkInfrastructures: SecurityThrough Intelligent Separation

P

secuview 1/2016 21

Technologies & Solutions

Today, digitalisation is occurring in a wide range of areas. The government is taking its processes digital, industrial companies are boosting efficiency with digital networking, and critical infrastructures are better able to meet modern-day requirements – arising from the energy market’s decentralised supply, for instance – thanks to IT-based systems. However, digitalisation is also giving way to technical conformity, because systems are increasingly built on IP technology. This offers a big boost in efficiency and compatibility, but also presents a huge increase in risk. Is it possible to achieve an adequate level of security nonetheless?

>>>

Page 22: Digital Sovereignty

Technologies & Solutions

There are already a number of answers to these

questions, but in many cases isolated individual

solutions are used to approach the issue. However,

individual solutions are not sufficient to provide

comprehensive protection, as small deficiencies that

are often found in complex interfaces (in teleworking,

employees’ remote access, remote maintenance

access, etc.) can weaken the overall system.

A concept for secure IT infrastructures Security can only ever be guaranteed if data flows

are controllable and different security domains are

separated. Technology can achieve precisely that. It

is vital to analyse the infrastructure from a holistic

point of view and to assign it appropriate security

domains. When doing so, it is not necessary to de-

velop an entirely new network in one go. In fact, it

is perfectly possible to use existing and comple-

mentary components to gradually improve security

– provided that you always keep an eye on the bigger

picture.

secunet shows how a concept like this can help you

to meet the opposing requirements of network sepa-

ration and integration simultaneously. The approach

is based on the intelligent use of separation tech-

nologies: security domains which are fundamentally

separated are then selectively connected using intel-

ligent security measures. The basis for the specific

technical implementation is the organisational struc-

turing of the security domains.

Strong network boundariesdespite networking

In many public authorities and companies, specific

applications and systems are defined in networks

that require especially strong protection. These in-

clude public administration networks used to process

classified information and industrial networks used to

operate network management systems, for instance.

In the figures below and on the right, you can see how

isolated security domains can be created in these net-

work areas – even across different locations. Commu-

nication links are managed through private and public

networks via VPN – and only authorised, authentica-

ted partners, who may be temporary and recordable

– are allowed. In order to map the structures and

processes of your organisation, you can create as

many security domains as you wish.

Simultaneously manage multiplesecurity domains from anywhere with a single deviceSeparation shouldn’t end at the network infrastruc-

ture; it should be maintained even in the end device.

The ideal client for this is the SINA Workstation,

which can be used as a fixed or mobile workstation.

It is equipped with secure VPN technology, two-fac-

tor authentication and encrypted data storage. SINA

Workstation makes it possible to simultaneously use

several work environments which belong to different

security domains – and therefore have hitherto been

physically separated – on the same device. The work

Secure data

processing

in public

administration

22 secuview 1/2016

Page 23: Digital Sovereignty

>>>

environments are proven to be securely separated.

The user then works with several so-called guest

systems, allowing them to simultaneously handle

email correspondence, browse the web, edit confid-

ential documents and operate a critical system, all

without having to compromise the strict separation

of security domains.

Data locks between networksIn many cases, it must be possible to transfer data

between domains with different protection require-

ments despite separation. For example, documents

that are subject to higher security classifications dur-

ing editing must be able to be transferred for further

processing in higher-classified security domains. In

addition, some companies need to export specific

operational parameters from the isolated security do-

main of the plant control system, in order to forward

these to consumers through sales, for instance. When

doing so, the connections between domains always

pose a risk for the more highly classified network.

In order to create a connection while maintaining

strict separation between networks, you need a

so-called connector, which decouples differently

classified networks at the logical level. Positioned at

network boundaries, it takes data from the source

network, processes it with help from its transport

and testing services, and then makes it availab-

le for use by the target network. Between CI-clas-

sified networks in public authorities, a diode – like

the SINA One Way which is approved up to German

national GEHEIM level - can be used for this logical

decoupling, which helps to prevent attacks from

lower-classified networks and data outflows from

higher-classified networks. In industrial networks,

connectors can manage data flows using similar

frameworks and separation technologies.

Monitoring and managing threat levelsBy continually monitoring data flows, anomalies

caused by malware or malfunctions can be detected

early in order to prevent potential loss or damage.

The use of a monitoring system like spotuation can

provide an added layer of security at this stage. It will

check whether or not the requirements for specific

encryption technologies have been met and can use

‘learned behaviour’ to detect anomalies in network

data flows, which can be an indication of advanced

persistent threats (APTs).

Accessing the internet fromcritical areasThere are few workplaces in the world that can get

by without access to the internet. However, there

are technologies that permit internet access from

critical networks without increasing the security risk.

ReCoBS-based systems like secunet safe surfer al-

low networks to access the internet through terminal

server logic. This means there is no direct connec-

tion between the critical network and the internet.

Instead, access is only provided via audio-visual

secuview 1/2016 23

Technologies & Solutions

Secure plant

and system

operation

in critical

infrastructures

Page 24: Digital Sovereignty

Technologies & Solutions

24 secuview 1/2016

transmission through separate, so-called sacrificial

systems, on which the actual browser sessions

are isolated and run. This achieves strict network

separation, as access to the internet is not achieved

from within the critical network.

Digitalisation: securely implemented using your existing systemRegardless of your field, industry, sector or country,

the challenges of developing a secure infrastructure

with multiple security domains are generally very

similar, at least from a technical standpoint. The

architecture components shown here are merely

illustrative. They can be used in parallel and in com-

bination with existing technology.

IT security always requires a holistic approach.

secunet can draw on nearly 20 years of experience

in IT and network security to develop tailored, intelli-

gent concepts for diverse applications. An intelligent

blend of existing technology and good IT organisation

is the key to security in the digital era. n

More information:

For CRITIS companies

Torsten Redlich

[email protected]

For public authorities

Norbert Müller

[email protected]

A secure foundation: SINA technologySINA (Secure Inter-Network Architecture), which secunet developed on behalf of the German Federal Office for

Information Security (BSI), offers all the aforementioned possibilities for network separation. The key idea behind

SINA is to protect differently classified data locally and during transfer via open networks. SINA is a holistic system

architecture whose security components mesh completely.

The approval-compliant dimensioned and configured hardware is available in special, hardened constructions as

required. It provides protection against emissions and manipulation, as well as cryptographic modules. In addition,

the hardware contains security-evaluated firmware. The software-related basis of the SINA technology is the min-

imised and functionally hardened SINA OS, which has been intensively evaluated with respect to security. Both

smartcards as trust anchors and loopback file systems are embedded in the system platform. Many highly

developed security modules stacked on multiple levels within the system depth (e.g. IPsec encryption, access

control and firewall functions) protect SINA against any number of attacks. There are strictly separated work

environments with various classifications at the top level of the SINA layer model. On the one hand, they contain

commercially available guest operating systems and applications encapsulated in virtual machines (PCs). On the

other hand, they contain terminal functionality.

The SINA L3 Box is a key component used as an encrypted VPN gateway, while the SINA L2 Box can be used as an

Ethernet encoder. The entire network and all SINA components are administered in SINA Management.

Page 25: Digital Sovereignty

secuview 1/2016 25

Technologies & Solutions

Certified Trustworthiness: the secunet eID PKI Suite and secunet wall

he secunet eID PKI Suite and the firewall

solution secunet wall have been success-

fully certified according to Common Crite-

ria EAL4 augmented. At CeBIT, Arne Schönbohm,

the President of the German Federal Office for In-

formation Security, presented secunet with two IT

security certificates that independently certify the

trustworthiness of both products.

With the eID PKI Suite, secunet is making soft-

ware components available that combine to form a

powerful overall system – both for a valuable pub-

lic key infrastructure (PKI) based on the X.509

standard and for handling official documents. The

components can also be integrated individually into

an existing system architecture. Using the certified

kernel, the eID PKI Suite can be deployed in environ-

ments that need to meet high security standards

according to Common Criteria.

The certified secunet wall Packet Filter 5.1.0 is a

Linux-based packet filter component and makes it

possible to integrate packet filter functionality into

firewall or VPN products that are components of

secunet wall or the SINA product range. Its most

important security functions include information

flow controls, audit data generation and configu-

ration management. n

T

Two new IT security certificates for secunet’s products

Arne

Schönbohm,

President of the

BSI, presents

the new

IT security

certificates

to secunet

CEO Dr Rainer

Baumgart.

Page 26: Digital Sovereignty

26 secuview 1/2016

Technologies & Solutions

remote configuration updates, SNMP connections,

HSB-2 and VLAN according to IEEE 802.1Q for the

first time. n

More information:

Carsten Fischer

[email protected]

he demands on modern VPN solutions are

constantly growing. Indeed, throughput, man-

ageability, reliability, user-friendliness and

easy monitoring capabilities are increasingly im-

portant, because more and more services and data

sources are connected via VPN – thus guaranteeing

data protection on one hand and faster processes

on the other.

Last year, the entire SINA L3 Box range was gradu-

ally overhauled, meaning the range can now meet

future demands of our clients as well. Redundant

power supply units and a dedicated hardware

monitoring module have improved operational

security, while larger memories and more power-

ful processors have enhanced

cryptographic efficiency with

higher throughput per VPN.

And enhanced performance

doesn’t always cost more! The new generation of

SINA products will cost the same as the previous

versions.

The new SINA portfolio will be delivered with stand-

ardised generation 3.7 SINA software. This means

that the entire SINA product range will offer enter-

prise functionality like remote software updates,

T

SINA Rejuvenated

Sneaker Administration is History!rom Q1 2017, the SINA Remote Admin Server S

will enable administrators to carry out conven-

ient remote maintenance and administration

for all SINA Workstation S on their network. Admin-

istrators can use the system to implement new

installations of SINA software and make retrospec-

tive configuration changes from their office – for any

number of clients. Security-critical certificates, new

SINA Apps and additional network profiles can also

Fbe installed remotely, no matter where the compa-

ny’s employees are! This minimises the adminis-

trative workload and travel costs, and also helps to

automate certain operational procedures. n

More information:

Jan-Dominik Müller

[email protected]

The SINA L3

Box S 30M:

the powerful

SINA desktop

device – also

suitable

for rack

installation.

The SINA L3 Box S R 50M is optimised for

rugged use in vehicles or production plants.

The SINA L3 Box S 5G is designed

for use in central hubs.

Page 27: Digital Sovereignty

Technologies & Solutions

secuview 1/2016 27

News from the SINA Workstation S remote data processing centre – thus making it pos-

sible to save bandwidth when using LTE or UMTS

on the move. The feature can also be used as a data

lock for USB sticks, meaning Windows guest sys-

tems no longer need to have direct access to USBs.

New application scenarios Alongside supporting new hardware, version 3.3.5

of the SINA Workstation S will offer USB 3.0 sup-

port in virtual guest systems for the first time. This

has the advantage of significantly increasing data

transfer speeds while also providing better support

for isochronous USB devices. This means USB au-

dio and video devices – or passport and document

scanners, for instance – will receive high-powered

support, thus expanding SINA Workstation S appli-

cations considerably. n

More information:

Gordon Freiburg

[email protected]

oot from ISO imagesSince the SINA Workstation S 3.3.2, it has

been possible to boot SINA guest systems

from ISO images, meaning that a Windows installa-

tion can now be implemented easily without using a

physical data storage device. This feature can also

be used to boot a guest system using specific boot-

loader images from a USB stick or fixed network ad-

dress. A virus scanner can also be booted from an

ISO image, which will analyse the hard drive without

having to start up the guest system.

Private networksIn private networks on the SINA Workstation S (from

version 3.3.4.1), two guest systems with different se-

curity domains and the same security classification

can communicate with each other across the net-

work. This expansion could soon be used to operate

the ReCoBS-based secunet safe surfer applica-

tion locally on the SINA Workstation – including the

sacrificial system that would usually be run from a

The First Ethernet Encoder with SECRET-Level Approval

secunet will soon be expanding the SINA

product range to include the SINA L2 Box H,

the first Ethernet encoder to be approved for

the German national GEHEIM level by the German

Federal Office for Information Security. The product

is currently expected to be available in Q4 2016.

With the SINA L2 Box H, secunet has developed a

special Ethernet encryption device for national and

international high-security networks based on the

SINA L3 Box H product range. The new range suit-

able for security classifications up to GEHEIM will

include powerful encryption devices for secure data

S

B

transfers in networks on OSI

layer 2 (Ethernet). Thanks to its

low latency, the SINA L2 Box H

is destined for use in scenarios involving a high qua-

lity of service or real-time requirements. In addition,

with a 1 GBit/s full duplex data throughput, it is set

to open up new horizons for the communication of

GEHEIM-level data. n

More information:

Jörg Rösch

[email protected]

Page 28: Digital Sovereignty

28 secuview 1/2016

The consequences of digitalisation for hitherto strictly separated company processes and networks – and the associated difficulties and risks – are well-recognised. Consequently, practical solutions that don’t require complete restructuring or complex interventions in existing structures are in demand. But how can managers, CISOs and technicians be sure that their network meets all relevant security requirements?

Control the Network – Tailored Real-TimeNetwork Analysis

Page 29: Digital Sovereignty

Technologies & Solutions

secuview 1/2016 29

This kind of monitoring system offers a number of

advantages for all those involved:

- Senior management receives reports for evaluating

compliance in accordance with company guide-

lines; the use of outdated browser versions will be

reported, for instance

- IT and security experts receive ongoing situation

reports that illustrate the current network security

status; hidden communication channels and asso-

ciated anomalies will become visible, for instance

- Administrators and security analysts will gain

insights into the network, up to and including the

potentially anomalous header information of indi-

vidual IP packets

Security arises from the interplay of these organisa-

tional and technical elements. In order for a company

to always maintain an appropriately high level of IT

security infrastructure, information handling must be

understood as a process following the well-known

PDCA pattern:

define IT security objectives (plan), implement the

relevant measures (do), check efficacy with probes

(check) and implement countermeasures in case of

deviation (act). n

More information:

Dr Marc Lindlbauer

[email protected]

or holistic IT security – which is necessary for

companies and authorities that want com-

plete control over their data – safeguards

designed to prevent or respond to threats must be

introduced at both the organisational and technical

levels. On the organisational level, it is common for

companies to establish an ISMS, which can be used

to define processes and make managing and con-

trolling company-wide IT security more concrete and

effective. An ISMS is a prerequisite for maintaining

an up-to-date overview of all relevant security

processes – and thus for well-founded risk man-

agement.

Making network IT security visibleOn the technical level, preventive measures like

firewalls, VPNs and well-known access control

mechanisms (e.g. two-factor authentication) are still

indispensable, but are no longer nearly enough. In

order to ward off today’s targeted attacks, so-called

APTs, a range of new methods and approaches

are vital. An efficient method for controlling data

movement in and between networks – and thus for

detecting deviations from technical guidelines – is

the use of so-called ‘probes’, which continually ana-

lyse and evaluate data flows for compliance with

defined rules. When using these probes, it is essen-

tial that data flows or the information gleaned from

these data flows be visualised continually.

F

Page 30: Digital Sovereignty

30 secuview 1/2016

Long-term Key Management

Car2X and autonomous driving are hot topics in the automotive industry. Besides communication between cars, emergency vehicles and roadside infrastructure, ‘off-highway’ vehicles are also increasingly opening up to data exchanges

obile commercial vehicles like agricultural,

forestry or construction vehicles bene-

fit from digitalisation in a variety of ways.

Agricultural machines, for instance, can help farmers

to optimise fertilising and harvest planning based on

information fed into the vehicle about the location,

yield and soil quality. Among other things, this can

also lead to energy savings in field logistics and a

dynamic plan for achieving higher sales prices in

electronic marketplaces.

Just as in the automotive industry, data is reliably pro-

tected here with cryptography, which helps to gua-

rantee information security attributes like integrity

and confidentiality, etc. These safeguards against

attacks on electronic vehicle systems and networking

services are increasingly – and logically – factored

into early designs for implementation during manu-

facture.

The challenges faced by OEMs in the automotive

industry differ from those in other industries, as

described below:

- Lifetime: For an average of 18-30 years (cars: 18,

lorries: 24, transporters and motorbikes: 30), the

cryptographic infrastructure must be able to

handle large unit volumes (expected: 100 million

new cars worldwide every year from 2020) and

model lifecycle functions like certificate call-back

lists or even changes to algorithms.

- Performance and latency: Electronic vehicle com-

ponents and, in particular, cryptographically

secured services like permission allocation and

activation are much more dynamic than they are

for official document permissions. This means

‘live’ functions need to be integrated that will allow

data to be securely changed during operation.

M

Technologies & Solutions

Page 31: Digital Sovereignty

secuview 1/2016 31

- Limited vehicle resources: Due to price pressures

on unit costs, many vehicles lack vital resources

like comprehensive security elements at the hard-

ware level. This must be offset through complex

cryptographic concepts, which are developed

differently from model to model and require the

support of a flexible cryptographic infrastructure.

In the future, Car2X communication and auton-

omous driving will both play a major role in the

automotive industry. Fully automated driving

presents greater risks with regard to operational

safety, as in the event of a vehicle incident the

driver will be unable to intervene directly. This must

be compensated by the proactive implementation

of safety features early on in the design process.

secunet KeyCore 2.0, our solution for automotive

key management, makes it possible to imple-

ment the security necessary for current and future

application scenarios – and look at the challenges

of ‘secure key management’ and ‘certificate infra-

structure’ in the rear-view mirror. n

More information:

Hartmut Kaiser

[email protected]

Technologies & Solutions

Page 32: Digital Sovereignty

The number of mobile devices is growing rapidly. One of the factors in their success is the use of social networks. However, revealing your location (in particular) means opening yourself up to the risk of being very easily monitored

The Transparent Man – Myth or Reality?

Technologies & Solutions

32 secuview 1/2016

Thanks to your location, a complete profile of

your movements can be created without the

need to hack data from the network – sim-

ply by using the so-called ‘Nearby Friends’ feature,

which shows how far away your friends are.

Example: Andrea is sitting in a cafe in Marienplatz

in Munich and wants to know who is nearby. Her

friend Bernd is in the English Garden and her friend

Christina is in Odeonsplatz. Once she activates the

Nearby Friends feature, she receives the following

information:

1. Bernd is three kilometres away.

2. Christina is one kilometre away.

As it would be difficult to find Bernd in a three-kilo-

metre radius, Andrea needs a more specific loca-

tion. It’s easy to get one with the help of her Android

smartphone. She goes to Developer Options and

activates the Simulated Location feature – which

can change the GPS position of the smartphone at

any time to whatever coordinates you wish – and

sets her position to Königsplatz. All of the apps in-

stalled on her device will now use this location as

the phone’s GPS position. Now the Nearby Friends

feature says Bernd is two kilometres away.

The actual locations of friends Bernd and

Christina. The app only gives a person’s

distance in kilometres.

Bernd

Christina

Andrea

~ 1 km

~ 3 km

Page 33: Digital Sovereignty

Bernd

Andrea

Königsplatz

Theresienwiese

secuview 1/2016 33

Technologies & Solutions

Andrea’s

three location

requests about

Bernd give

her this

information.

>>>

So Andrea has two pieces of information which

can be visualised as two circles. These have two

intersecting points and Bernd is at one of them. To

determine which is the correct position, a third

measurement is needed. Andrea therefore creates

a new simulated location at Theresienwiese. The

Nearby Friends feature now displays a circle with

a four-kilometre radius. Bernd is at the intersecting

point of all three circles.

As the numbers in the apps are rounded, the infor-

mation gleaned is still not entirely accurate. Bernd is

not located exactly where the three circles meet; he

will be within one kilometre of the intersecting point.

His exact position can be determined using a simple

algorithm.

For this purpose, Andrea places simulated locations

in a one-kilometre circle around the intersecting

point. If the feature shows Bernd is just one kilo-

metre away, the intersection of these two circles will

create a new, smaller area in which Bernd can be

found. If they show a greater distance, Bernd will

Bernd’s exact

position can

be determined

using a simple

algorithm.

Page 34: Digital Sovereignty

Technologies & Solutions

34 secuview 1/2016

German IT SecurityCongress: Call for Papers

research institutes, local administration and other

institutions can submit their proposals on IT security

by email at [email protected]. The dead-

line for proposals is 31 August 2016.

The proposals will be anonymously evaluated by

a top-class programme committee. The best sub-

missions will be selected for the congress. You can

find more information on the BSI’s website. n

rom 16 to 18 May 2017, the 15th German

IT Security Congress will take place in Bonn

with the theme “Digital Society: Between

Risk Taking and Security Needs”. The German

Federal Office for Information Security (BSI) is look-

ing for companies, public authorities and research

institutes to help shape the agenda with topical,

creative and practice-orientated contributions.

Interested authors from companies, universities,

F

not be in the intersection of the two circles, meaning

those areas can be dismissed. Andrea must simply

repeat these steps until she has determined Bernd’s

position to the desired degree of accuracy. At best,

Bernd’s GPS position can be determined to within

10 metres.

The attack described here may seem very compli-

cated, but in practice, the steps can be completely

automated using Android emulators. Services like

this can be used for a fee online. If the Nearby

Friends feature is activated on the account users

want to spy on, the online programme will deliver

a precise breakdown of the individual’s location to

paying customers.

For the app industry, it’s even simpler; companies

can implement their own code directly in smartphone

apps in order to read the phone’s location – and

potentially contacts, emails, photos, etc. too. This

means that market research companies can easily

access personal data and advertising companies

can place highly targeted ads, for instance. De-

velopers can earn good money by integrating

these codes into their apps. According to c’t

Android 2016, around two-thirds of Android

apps share contacts with advertising or analytics

networks.

secunet is currently working on solutions that will

make it possible to create and implement rules for

forwarding and processing user data. However, as

always, the most powerful tool against data collec-

tion is the user themselves. Users should only install

apps they need on their smartphones and should

read each app’s required permissions carefully. n

More information:

Thomas Maier

[email protected]

Page 35: Digital Sovereignty

secuview 1/2016 35

Dates

secunet’s head office has moved! You’ll now find us

at Kurfürstenstraße 58, 45138 Essen, Germany. Our

previous telephone and fax numbers haven’t changed.

In the office building on the Ruhrallee junction, we

now have enough room again for all of our Essen

employees.

New Address

Press Law Representative: Christine Skropke, [email protected] Editor, Head of Design and Content: Claudia Roers,[email protected]; deputy: Marc Pedack, [email protected]: Agentur für dynamisches Marketing, www.knoerrich-marketing.de

Copyright: © secunet Security Networks AG. All rights reserved. All content herein is protected under copyright law. No part of this magazine may be reproduced or otherwise used without the prior written consent of secunet Security Networks AG.Illustrations: Cover, p. 10: Sergey Nivens / Shutterstock; p. 2, 28: Andrey_Popov / Shutter- stock; p. 2, 32, 33 map: OpenStreetMap; p. 4, 6: Dietmar Wadewitz; p. 13 map: pavalena / Shutterstock; p. 13 Foto: Nikolai Sorokin / Fotolia; p. 14, 16: source: NAPMA; p. 18: from left to right: Klaus Hertz-Ladiges / Shutterstock, Zlatko Guzmic / Fotolia, Gena96 / Shutterstock; p. 31 Illustration: Lutz Lange; Others: secunet

September to November» NIAS - Cyber Security Symposium / Mons, Belgium

» One Day - One Topic Seminar on Biometrics / Zurich, Switzerland

» security essen / Essen, Germany

» AFCEA TechNet Europe / Rotterdam, Netherlands

» it-sa / Nuremberg, Germany

» Future of Cyber Conference 2016 / Prague, Czech Republic

» 12th ICAO TRIP Symposium & Exhibition / Montreal, Canada

» National IT Summit / Saarbrücken, Germany

» Workshop “IT Security on Board” / Munich, Germany

» Berlin Security Conference / Berlin, Germany

07 – 08 Sept 2016

22 Sept 2016

27 – 30 Sept 2016

04 – 05 Oct 2016

18 – 20 Oct 2016

20 – 21 Oct 2016

15 – 17 Nov 2016

16 – 17 Nov 2016

25 Nov 2016

29 – 30 Nov 2016

Would you like

to arrange an

appointment with us?

Just send an e-mail to

[email protected].

Editor:secunet Security Networks AGKurfürstenstraße 5845138 Essen, Germanywww.secunet.com

Subscribeto secuview

Would you like to receive secuview on a regular basis, free of charge?

Please choose between the print and electronic versions and subscribe at https://www.secunet.com/en/secuview.

There you can also change your preference or unsubscribe.

Imprint

Page 36: Digital Sovereignty

Information is a key asset for a company. Therefore keeping it secure

is not a one-time issue but an on-going, comprehensive process. With

the ISMS (Information Security Management System) from secunet you

can manage the protection of these assets permanently, appropriately

and according to approved standards. And it is measurable and

comparable – at any time.

Sounds impossible? Put us to the test!

www.secunet.com/isms

Highly sensitive becomes highly secure.With the ISMS from secunet.

IT security partner of the Federal Republic of Germany